TY - GEN N2 - "Information security expert Bruce Schneier explains what everyone in business needs to know about security in order to survive and be competitive. Pragmatic, interesting, and humorous, Schneier exposes the digital world and the realities of our networked society. He examines the entire system, from the reasons for technical insecurities to the minds behind malicious attacks. You'll be guided through the security war zone, and learn how to understand and arm yourself against the threats of our connected world." "Secrets and Lies offers the expert guidance you'll need to make the right choices about securing your digital self."--Jacket. AB - "Information security expert Bruce Schneier explains what everyone in business needs to know about security in order to survive and be competitive. Pragmatic, interesting, and humorous, Schneier exposes the digital world and the realities of our networked society. He examines the entire system, from the reasons for technical insecurities to the minds behind malicious attacks. You'll be guided through the security war zone, and learn how to understand and arm yourself against the threats of our connected world." "Secrets and Lies offers the expert guidance you'll need to make the right choices about securing your digital self."--Jacket. T1 - Secrets and lies :digital security in a networked world / AU - Schneier, Bruce, AU - Ferguson, Niels. AU - Schneier, Bruce, VL - / Bruce Schneier. CN - QA76.9.A25 N1 - "With new information about post-9/11 security."--Cover. N1 - Book copyrighted 2000, Chapters 1 and Introduction are copyrighted 2004. N1 - Wiley Computer Publishing. N1 - Originally published: 2000. Reprint with new introduction. N1 - "Wiley computer publishing". N1 - Subtítol a coberta: "Digital security in a networked world. With new information about post-9/11 security.". N1 - Titel op stofomslag: Secrets & lies. N1 - THE LANDSCAPE. Digital Threats. Attacks. Adversaries. Security Needs. TECHNOLOGIES. Cryptography. Cryptography in Context. Computer Security. Identification and Authentication. Networked-Computer Security. Network Security. Network Defenses. Software Reliability. Secure Hardware. Certificates and Credentials. Security Tricks. The Human Factor. STRATEGIES. Vulnerabilities and the Vulnerability Landscape. Threat Modeling and Risk Assessment. Security Policies and Countermeasures. Attack Trees. Product Testing and Verification. The Future of Products. Security Processes. Conclusion. Afterword. Resources. Index. ID - 12350 KW - Computer networks KW - Cryptography. KW - Copyright. KW - Internet KW - INFORMATION SCIENCE (DOCUMENTATION) : INFORMATION SCIENCE, OVERALL VIEW : ELECTRONIC INFORMATION (LEGAL AND REGULATORY FRAMEWORK) KW - Sécurité informatique. KW - Réseaux d'ordinateurs SN - 0471253111 TI - Secrets and lies :digital security in a networked world / ER -